{"vulnerability": "CVE-2022-24716", "sightings": [{"uuid": "be615ade-b1d0-4453-aa02-438f56d7dc75", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-24716", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-06T03:13:45.000000Z"}, {"uuid": "9da82c79-c9f4-49dc-a307-8c0e0d14bfea", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-24716", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-23T04:10:44.000000Z"}, {"uuid": "f2754ee5-42eb-4a99-876a-ee5ee46c9a31", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-24716", "type": "seen", "source": "https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/scanner/http/icinga_static_library_file_directory_traversal.rb", "content": "", "creation_timestamp": "2023-05-03T17:04:07.000000Z"}, {"uuid": "e3aa9b65-61f3-4453-a59e-e78c24fb5b80", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-24716", "type": "seen", "source": "MISP/a9d21043-f825-4bac-8d2b-56fb9e8343e7", "content": "", "creation_timestamp": "2025-10-23T21:13:00.000000Z"}, {"uuid": "d2e485d1-c65b-4524-806d-039aef4fcb66", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-24716", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/7967", "content": "#exploit\n1. CVE-2022-24715 / CVE-2022-24716:\nAuthenticated RCE / Arbitrary File Disclosure Vulnerability in Icinga Web2 &lt;2.8.6, &lt;2.9.6, &lt;2.10\nhttps://github.com/JacobEbben/CVE-2022-24715\nhttps://github.com/JacobEbben/CVE-2022-24716\n\n2. CVE-2023-27326:\nVM Escape for Parallels Desktop &lt;18.1.1\nhttps://github.com/Impalabs/CVE-2023-27326\n\n3. CVE-2023-23192:\nUserlock Multi-Factor Authentication (MFA) Bypass\nhttps://github.com/pinarsadioglu/CVE-2023-23192", "creation_timestamp": "2023-03-21T11:01:01.000000Z"}, {"uuid": "da06ba4d-230d-4026-b8d3-dff6d4576d22", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-24716", "type": "seen", "source": "https://t.me/cibsecurity/38556", "content": "\u203c CVE-2022-24716 \u203c\n\nIcinga Web 2 is an open source monitoring web interface, framework and command-line interface. Unauthenticated users can leak the contents of files of the local system accessible to the web-server user, including `icingaweb2` configuration files with database credentials. This issue has been resolved in versions 2.9.6 and 2.10 of Icinga Web 2. Database credentials should be rotated.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-03-08T22:40:55.000000Z"}, {"uuid": "9d053e11-db71-4d8f-95c2-6774519b2c90", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-24716", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/13124", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-24716\n\ud83d\udd25 CVSS Score: 7.5 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N)\n\ud83d\udd39 Description: Icinga Web 2 is an open source monitoring web interface, framework and command-line interface. Unauthenticated users can leak the contents of files of the local system accessible to the web-server user, including `icingaweb2` configuration files with database credentials. This issue has been resolved in versions 2.9.6 and 2.10 of Icinga Web 2. Database credentials should be rotated.\n\ud83d\udccf Published: 2022-03-08T00:00:00.000Z\n\ud83d\udccf Modified: 2025-04-23T18:58:45.413Z\n\ud83d\udd17 References:\n1. https://github.com/Icinga/icingaweb2/security/advisories/GHSA-5p3f-rh28-8frw\n2. https://github.com/Icinga/icingaweb2/commit/9931ed799650f5b8d5e1dc58ea3415a4cdc5773d\n3. https://security.gentoo.org/glsa/202208-05\n4. http://packetstormsecurity.com/files/171774/Icinga-Web-2.10-Arbitrary-File-Disclosure.html", "creation_timestamp": "2025-04-23T19:05:21.000000Z"}, {"uuid": "4a8f2fcb-abe3-47e2-b30e-67a0e01d8a6b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-24716", "type": "published-proof-of-concept", "source": "https://t.me/dilagrafie/2612", "content": "CVE-2022-24716:  Unauthenticated users can leak the contents of files of the local system accessible to the web-server user, including `icingaweb2`.\n\nPoC Icinga Web 2 &lt;2.8.6, &lt;2.9.6, &lt;2.10 https://github.com/JacobEbben/CVE-2022-24716", "creation_timestamp": "2023-03-21T09:01:04.000000Z"}]}